What to expect at RSA Conference 2019
As adversaries increasingly work together to infiltrate systems containing the world's most sensitive and lucrative information, the impact the cybersecurity industry can have on our digital future cannot be understated. Convening the latest cybersecurity data, innovation and thought leadership, RSA Conference 2019 is "where the world talks security." This year's ... Read More

Evaluating a SOAR platform? Make sure to ask your vendor these 11 questions.
#SOAR keeps popping up in top 2019 #cybersecurity predictions. Here's how to evaluate which solution could work best for you. Top 5 security trends that will continue in 2019. 7 cybersecurity trends to prepare for in 2019. 60 cybersecurity predictions for 2019. Sound familiar? If your feed looks anything like ... Read More
What a SOAR platform’s case management capability should include
Effective case management takes things a step further by giving security analysts access to a single case record view to analyze dynamically and interact with all data and components related to an incident. When you hear security orchestration, automation and response (SOAR), case management isn't typically the first thing that ... Read More
What a SOAR platform’s case management capability should include
Effective case management takes things a step further by giving security analysts access to a single case record view to analyze dynamically and interact with all data and components related to an incident. When you hear security orchestration, automation and response (SOAR), case management isn't typically the first thing that ... Read More
How do you know if you’re ready for SOAR?
Industry-wide, security operations centers (SOCs) are struggling with overworked, understaffed teams; more alerts than they can handle; and increasingly sophisticated bad actors. Thought leaders agree a breach is not a matter of if but when. From intellectual property to proprietary information to personally identifiable information (PII), protecting the data of ... Read More
How to streamline cyber forensic investigations
Cyber forensic investigations are a critical component of any incident response process. While such investigations are important, gathering forensic details post-incident can be a cumbersome manual task. But with the right solutions in place–and fully integrated—you can significantly streamline investigations and ensure your enterprise remains protected, even against the most ... Read More
How to streamline cyber forensic investigations
Cyber forensic investigations are a critical component of any incident response process. While such investigations are important, gathering forensic details post-incident can be a cumbersome manual task. But with the right solutions in place–and fully integrated—you can significantly streamline investigations and ensure your enterprise remains protected, even against the most ... Read More
Gartner SOAR report: "Innovation Insight for Security Orchestration, Automation and Response"
If you’re even a casual fan of the original Star Trek, you’ll be familiar with Scotty’s signature phrase, “I can’t do it, Captain! I don’t have the power!” Or better, when he uttered the famous line, “I can’t change the laws of physics!” Scotty’s plight is probably recognizable to security ... Read More
Gartner SOAR report: "Innovation Insight for Security Orchestration, Automation and Response"
If you’re even a casual fan of the original Star Trek, you’ll be familiar with Scotty’s signature phrase, “I can’t do it, Captain! I don’t have the power!” Or better, when he uttered the famous line, “I can’t change the laws of physics!” Scotty’s plight is probably recognizable to security ... Read More

Using security automation and orchestration for SIEM triage
With increasing cyber threats, more organizations are using a variety of tools to monitor and manage security. Security information and event management (SIEM) systems are popular solutions that promise to monitor and alert your security operations (SecOps) team of potential threats. SIEM Systems Produce Too Many Alerts The reality is ... Read More